SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Ascend Communications (ASND)
ASND 207.04+0.7%Dec 8 3:59 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: djane who wrote (53158)8/30/1998 8:23:00 PM
From: djane   of 61433
 
7/98 Netwatcher on VPNOSS [ASND references]

Excerpt: The opening gambits in the VPNOSS wars are already underway, with Cisco and Ascend posturing the most
impressively. Lucent and Nortel both appear to face some architecture changes if they are to fully realize the
VPNOSS potential. While both companies certainly have the resources to make the changes they'd need, the
time component of the picture isn't as favorable for them.

cimicorp.com

In the Know

Most carrier relationships today start with an order and not with technology. The administrative
infrastructure of the carrier world is not well known among users, even though every phone call and every
service order consumes it.

Operations Support Systems, or OSSs, are the support foundation of voice telephony, and also of traditional
data services based on leased lines. For some time, carriers have been wrestling with the question of how
frame relay services, for example, would interwork with these OSSs. Now that data VPNs are on the horizon, it
may well be that work is already obsolete, because VPNs mandate a whole different set of features.

What's in a "VPNOSS", as we might call these new systems to support data VPNs? Is the VPNOSS a
replacement for, an adjunct to, or what, with respect to the current OSSs? Are there key players emerging in
the VPNOSS space? These are the issues we'll consider in this section.

What's a VPNOSS, Anyway?

An OSS provides carriers with order support, trunk and circuit inventory and management, trouble-ticket
handling, and billing. However different VPNs may be from traditional services, it is clear that all of these
functions wouldn't need to be redone from scratch to form a VPNOSS. In fact, it is certain that carriers would
want to reuse large portions of their existing systems-if for no other reason, to protect skills and practices
developed through years of use.

VPNOSSs might be expected to interact with OSSs on a sector-dependent basis, as follows:

1.In the order processing space, it is likely that VPNOSS order elements and provisioning issues
would be very different from that of the services supported under current OSSs. Thus, it
would probably not be useful to attempt to tightly integrate VPNOSS order management and
provisioning with that of the traditional OSSs.
2.For trunk and circuit inventory management, VPNs consume a very different kind of resource
than traditional circuit-mode networks, and it is likely this area would also not be readily
adapted from OSS to VPNOSS.
3.The trouble ticket or problem tracking area for VPNs should not be dramatically different from
the comparable OSS area, and it should be possible to adapt the current systems to serve
quite well. However, problem isolation and relating network problems to specific customer
commitments will require considerably greater effort with VPNs, given the shared
infrastructure. Some VPNOSS changes will be required.
4.Billing, in the form of bill generation and receivable tracking, should be the same for VPNs.
However, billing elements for VPNs will depend on a different set of chargeable items, and
journaling billing events will also likely be different. Thus, VPNOSSs may have to augment
standard OSS features here, but will not displace most of them.

From this, we can draw a picture of a VPNOSS. It is a new high-level provisioning and order entry system for
VPN services that will be available to service order processors in a carrier center. The VPNOSS will facilitate
the gathering of service parameters, and will then provide a means of provisioning the requested service
onto the network, making necessary changes in resource inventories. Problem analysis and management
elements linked to the shared-resource VPN infrastructure will feed the current problem tracking software,
and new billable event journaling elements will provide input to a slightly modified billing system.

A logical question to ask here would be how this structure will be formulated into a product. However logical
the question may be, it's one that's hard to answer at this point. The problem is that the evolution to a
VPNOSS will be influenced by a variety of forces, and it's not yet clear how those forces will balance over
the next five years-the critical period for VPNOSS evolution.

Who's Pushing VPNOSSs?

It would be surprising if the first factor that determined the direction of VPNOSSs wasn't the direction of
VPNs, and happily VPN trends are the primary issue. Today, what buyers would call a "VPN" is most likely to
be a frame relay or ATM network and associated access equipment, perhaps with some carrier management
thrown in.
This early VPN structure has its own "VPNOSS" in the management software of the infrastructure
vendor.

Frame relay and ATM network management systems provide basic VPNOSS support in the areas of
provisioning and problem management. This limitation of scope is not unreasonable given the fact that these
services are sold primarily in the form of PVCs, and are subject to relatively long service contracts. In effect,
the user's network is one-off provisioned using a standard management console. The service order function
consists of recording the requirements, which are passed in memo form to a specialist who then makes the
necessary network changes.

In the problem management area, the virtual circuit nature of ATM or frame relay allows reasonable (but not
complete) association of network problems to users, and trouble ticket software is generally offered for
problem management.

Billing is handled by creating a recurring monthly contract charge for the service based on the individual
pricing of the service elements. Because this is a contract charge, there is no need to meter usage or record
special service events.

What this has done is effectively build a completely parallel VPNOSS, one that has no real integration with
the standard OSS structure of the carrier. As we noted in the opening comments of this section, this has
already resulted in some carrier pressure to create more efficient linkages between the management platforms
of frame/cell networks and the OSSs. Thus, the carriers are pushing for some improvement.

The equipment vendors are also pushing, but for more infrastructure in the form of a network to provide for
IP VPNs. These VPNs would be offering a connectionless service rather than virtual circuits, and would
involve more OSI layers. Both these factors could be expected to make provisioning the service more
complex, both in terms of taking the orders and in terms of managing the resources that individual VPNs can
consume.

In truth, an IP VPN changes the picture of VPN provisioning fairly radically. Radical change, however, is not
the friend of a vendor market segment like network management that's been a loss leader for a decade or
more. Thus, current equipment vendors have tended to attack the problem of supporting IP VPNs using their
basic network management offering. Both Cisco and Ascend have recently announced new management
features targeting the VPN market, and both have made these features extensions of their management
architecture. While both vendors would certainly like the market to view their new offerings as completely
new, they are in fact largely based on previous management product elements.


There are other potential players interested in the VPNOSS space. Network management vendors like
Micromuse who focus on the fault/alarm correlation and management process may find the fault
interpretation aspects of VPN requirements a launch point for their products into the VPNOSS space.
Multivendor provisioning vendors like Syndesis could jump off from the VPN requirement to support
services across a variety of vendors' equipment.

What we're saying is that the shape of a VPNOSS will probably depend on what market forces gain
ascendancy over the next year or so. If VPNs develop relatively slowly, we would expect the infrastructure
vendors to retain more control over the evolution. If the opportunity develops quickly, the pressure to have
a good solution in the VPNOSS space would tend to empower newer players.

Now, What a VPNOSS Might Look Like

As we would see it, the core of a VPNOSS would be the same no matter what kind of player ends up
controlling evolution. Virtual network services need to be made concrete in order to be ordered and
provisioned, so we would expect that all VPNOSSs would be built around a visualizer element that would
create an icon or icons that could be said to represent a given VPN. The customer service rep at the carrier
and the buyer's representative would collaborate to create this VPN image, using interactive tools.

Once the image has been created, a VPNOSS would have to forward the image to a provisioning process to
determine if the network infrastructure could support the resources required for the VPN. If the resources
were not available, the VPN buyer would have to be contacted (assuming that this wasn't done in real time)
and some resolution to the problems discussed. If the resources were available, the network's resource
inventory would have to be reduced by the requirements for the VPN (even if it were to be made effective
later, to be sure that resources were available at the time the VPN was turned on).

The provisioning process is the first place we might see some differences in structure based on the direction
the VPNOSS vendor happened to take. An infrastructure vendor might elect to use a link to their own
management system to provide the resource inventory and the provisioning interface combined. Thus, to
these vendors the VPNOSS is an overlay to their normal management system. Most of the features of
provisioning would reside in that management system.

This overlay approach also demands an accommodation to the multi-vendor nature of networks, so
equipment players in the VPNOSS space are likely to have an interface to other vendors' management
platforms as well. This would make the VPNOSS a shell around whatever EMSs were in the network.

Vendors who are not players in the equipment space would probably not elect to cede as much functionality
to the management system, since these vendors would have to rely on management features of various
players. Instead, they would be likely to create sophisticated network map and inventory systems to serve as
the basis for the provisioning process, and create specialized software to thread routes for VPNs based on
service requirements. This would make them less dependent on the features of equipment EMSs, but since it
is not possible to provision frame/cell products based on standard MIBs, some specialized code would be
required for each vendor.

The same network image that guides provisioning would have to be used in problem analysis, for two
purposes.

First, the resource commitment of the infrastructure to support this particular VPN would have to be recorded
with the image so a problem in the network could be correlated to the VPNs it impacts. The way this would
work would vary depending on what kind of VPN was involved (virtual circuit or connectionless) and what
strategy was used to actually commit resources to it.

Second, the VPN image would form the repository for status data on the VPN, and this would be the basis for
a customer display of the VPN-a network icon in the customer's management system. Problem tracking
would have to work off this image, at least where problem tracking was customer-specific. We would assume
that the trouble-tracking system would start with "real" hardware problems and generate VPN-specific
trouble entries based on the image of the VPN. Customer complaints would have to follow the opposite
route-start with a VPN trouble ticket and correlate that and other reports with the network to deduce where
the real fault could be found, then generate a hardware ticket on it.

The billing aspect of the VPNOSS may be the most difficult. VPN images could be used to drive a software
process to poll nodes and read relevant statistics, but this would impose an operating load on the network.
We expect that the VPN players will eventually recognize the virtue of a Bellcore concept called "originating
node journaling", where the access device linking the buyer with the VPN at each site is responsible for
collecting the data needed to journal the events for billing.

This could have interesting impacts on the role of Class 5 switches. If a large portion of the line population in
a given CO were to be VPN-equipped, adding data VPN capability to Class 5s through the use of an xDSL
data card that pulled the data off onto a parallel LAN would be practical. In this situation, the data card
would feed its data around the Class 5 itself, but journaling events could be funneled through the Class 5
into the billing system.

The originating-node concept plays well with VPNOSS promoters from all camps, because there are really no
incumbent VPN edge players. Buyers don't associate VPN access with routers or FRADs in any determined
sense, so incumbent equipment vendors don't have a lock on the space. With new vendors as valid as old,
the software companies targeting the VPNOSS space have plenty of partnership opportunities.

There may be some special handling required on the billing side itself, depending on just what factors are
used to develop the charges for VPNs. Time billing can be accommodated easily, and message unit billing
practices might be adaptable to usage pricing as well, even that based in part on QoS. Nevertheless, it is clear
that a more flexible system of "call detail recording" would be helpful, and that would involve making billing
systems understand all of the new options.

When Will We See Them?

The opening gambits in the VPNOSS wars are already underway, with Cisco and Ascend posturing the most
impressively. Lucent and Nortel both appear to face some architecture changes if they are to fully realize the
VPNOSS potential. While both companies certainly have the resources to make the changes they'd need, the
time component of the picture isn't as favorable for them.


None of the software players, including those we've mentioned, has been able to gather the right
combination of partners and press attention so far. In truth, it's not clear whether any software firm is really
going to try to field a full VPNOSS, or just court partnerships with an infrastructure vendor.

By about 2001, we expect VPN activity to be impressive enough to create major problems for service
providers who don't have a proper foundation for the operations support process. That, ultimately, will set
the forward limit on how far the market can stumble along without a good solution.

There's always a chance for a surprise in this space. US West, at least, has taken the step of going to a
software provider (Syndesis) for a "topology mapper" element that would create for the carrier the central
model of provisioning we talked about earlier. With the carriers' big wallets opening, a lot of action could
take place in a hurry, even from players who have little or no established position in the market. Remember,
Cascade jumped into frame relay prominence on the strength of the potential RBOC frame relay market alone,
without any real wins to back them up. That shows that even a new player can become a giant when the
market conditions are prime-which they may be.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext